oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 19 )

2019 ( 92 )

2018 ( 364 )

2017 ( 360 )

Custom range...

Search Results: 1 - 10 of 27942 matches for " Jixin Ma "
All listed articles are free for downloading (OA Articles)
Page 1 /27942
Display every page Item
Ergodic Matrix and Hybrid-key Based Image Cryptosystem
Xiaoyi Zhou,Jixin Ma,Wencai Du,Yongzhe Zhao
International Journal of Image, Graphics and Signal Processing , 2011,
Abstract: The existing traditional cryptosystems, such as RSA, DES, IDEA, SAFER and FEAL, are not ideal for image encryption because of their slow speed and ineffectiveness in removing the correlations of the adjacent pixels. Meanwhile chaos-based cryptosystems, which have been extensively used over the past two decades, are almost all based on symmetric cryptography. Symmetric cryptography is much faster than asymmetric ciphers, but the requirements for key exchange make them hard to use. To remedy this imperfection, a hybrid-key based image encryption and authentication scheme is proposed in this paper. In particular, ergodic matrices are utilized not only as public keys throughout the encryption/decryption process, but also as essential parameters in the confusion and diffusion stages. The experimental results, statistical analysis and sensitivity-based tests confirm that, compared to the existing chaos-based cryptosystems, the proposed image encryption scheme provides a more secure means of image encryption and transmission.
STRUCTURE BASED FEATURE EXTRACTION IN BASKETBALL ZONE-DEFENSE STRATEGIES
Aihua Zheng,,Jixin Ma,,Miltos Petridis,,Jin Tang
International Journal of Computer Science & Applications , 2010,
Abstract:
Design and Implementation of a Wireless Sensor Network for Smart Homes
Ming Xu,Longhua Ma,Feng Xia,Tengkai Yuan,Jixin Qian,Meng Shao
Computer Science , 2010,
Abstract: Wireless sensor networks (WSNs) have become indispensable to the realization of smart homes. The objective of this paper is to develop such a WSN that can be used to construct smart home systems. The focus is on the design and implementation of the wireless sensor node and the coordinator based on ZigBee technology. A monitoring system is built by taking advantage of the GPRS network. To support multi-hop communications, an improved routing algorithm based on the Dijkstra algorithm is presented. Preliminary simulations have been conducted to evaluate the performance of the algorithm.
Realization of a Covert Communication System Over the Public Switching Telephone Network
Jixin Liu,Zheming Lu
Information Technology Journal , 2009,
Abstract: In this study, a covert communication applying the vector quantization based information hiding algorithm and the Public Switching Telephone Network (PSTN) is implemented. The system aims at offering good security of the secret binary image message and the real-time performance that is very important for the speech calling of the telephone service. Therefore, we adopt a simple and effective encryption method for the secret binary image message prior to the embedding process. The embedding position is also protected by using a secret key. By using these methods, the requirement of short-term protection in the bursting phone call communication for the secret binary image message and the real-time encryption are both fulfilled. Furthermore, an information hiding algorithm based on vector quantization is proposed and the advantage of it is discussed. We evaluate the system with the ITU-T G.729a standard speech codec in StegoPhone, which is our platform for research on covert communication technology via PSTN. The experimental results show that our method has negligible hearing effects on the conversation speech and meet the requirement of the real-time calling conversation communication via PSTN.
Multivariate saddlepoint approximations in tail probability and conditional inference
John Kolassa,Jixin Li
Statistics , 2010, DOI: 10.3150/09-BEJ237
Abstract: We extend known saddlepoint tail probability approximations to multivariate cases, including multivariate conditional cases. Our approximation applies to both continuous and lattice variables, and requires the existence of a cumulant generating function. The method is applied to some examples, including a real data set from a case-control study of endometrial cancer. The method contains less terms and is easier to implement than existing methods, while showing an accuracy comparable to those methods.
Cost Control of the Transmission Congestion Management in Electricity Systems Based on Ant Colony Algorithm  [PDF]
Bin Liu, Jixin Kang, Nan Jiang, Yuanwei Jing
Energy and Power Engineering (EPE) , 2011, DOI: 10.4236/epe.2011.31003
Abstract: This paper investigates the cost control problem of congestion management model in the real-time power systems. An improved optimal congestion cost model is built by introducing the congestion factor in dealing with the cases: opening the generator side and load side simultaneously. The problem of real-time congestion management is transformed to a nonlinear programming problem. While the transmission congestion is maximum, the adjustment cost is minimum based on the ant colony algorithm, and the global optimal solu-tion is obtained. Simulation results show that the improved optimal model can obviously reduce the adjust-ment cost and the designed algorithm is safe and easy to implement.
Analysis of Influence Factors of Tide-Dominated Estuaries Based on Deposition Numerical Simulation  [PDF]
Tao Tang, Jixin Huang, Yanshu Yin, Wenjie Feng
Open Journal of Yangtze Oil and Gas (OJOGas) , 2018, DOI: 10.4236/ojogas.2018.32012
Abstract: Tide-dominated estuaries sedimentary reservoir is a hot area of sedimentology research in recent years, and the important target of oil and gas exploration is one of the relatively few sedimentary systems. Based on the study of underground reservoirs, outcrop and modern sedimentation, scholars believe that the estuary is a sedimentary system formed by transgressive system tract, which is composed of a complex subfacies environment with obvious changes. Its formation is influenced by many factors. The purpose of this paper is to simulate the deposition process of estuaries by Delft-3D software, and to reveal the main controlling factors of estuarine reservoir formation. The factors are as follows. 1) The size of the river flow has a destructive effect on the formation of the estuarine sand bar in the estuary, but the effect is small. 2) Tidal energy plays a constructive role in estuarine sand bars in estuaries, and it is also the main force for the formation of estuarine reservoirs. 3) The composition of the sediments has an obvious influence on the formation of the estuarine reservoir, and the content of the mud is an important factor for the retention of the estuarine sand bar.
Properties of Phase Transformation of Ferroelectric Thin Films with Surface Layers  [PDF]
Lian Cui, Xu Xu, JiXin Che, Zelong He, Huijie Xue, Tianquan Lv
Journal of Modern Physics (JMP) , 2011, DOI: 10.4236/jmp.2011.29125
Abstract: Using the generalized Ginzburg-Landau-Devonshire theory, the characteristics of phase transformation of a ferroelectric thin film with surface layers are investigated. We study the effect of the surface layer on the properties (coercive field, critical thickness) of a ferroelectric thin film. Our theoretical results show that the surface layer is likely to answer for the emergence of phase transformation.
The evolutionary history of Cytochrome P450 genes in four filamentous Ascomycetes
Jixin Deng, Ignazio Carbone, Ralph A Dean
BMC Evolutionary Biology , 2007, DOI: 10.1186/1471-2148-7-30
Abstract: A total of 376 P450 genes were assigned to 168 families according to standard nomenclature. On average, only 1 to 2 genes per family were in each genome. To resolve conflicting results between different clustering analyses and standard family designation, a higher order relationship was formulated. 376 genes were clustered into 115 clans. Subsequently a novel approach based on parsimony was developed to build the evolutionary models. Based on these analyses, a core of 30 distinct clans of P450s was defined. The core clans experienced contraction in all four fungal lineages while new clans expanded in all with exception of NC. MG experienced more genes and clans gains compared to the other fungi. Parsimonious analyses unanimously supported one species topology for the four fungi.The four studied fungi exhibit unprecedented diversity in their P450omes in terms of coding sequence, intron-exon structures and genome locations, suggesting a complicated evolutionary history of P450s in filamentous Ascomycetes. Clan classification and a novel strategy were developed to study evolutionary history. Contraction of core clans and expansion of novel clans were identified. The exception was the NC lineage, which exhibited pure P450 gene loss.Fungi comprise a large and diverse kingdom of organisms. It is estimated that as many as 1.5 million species exist in the planet today [1,2]. Most described fungi grow by producing long, multi-celled hyphae, and are known as filamentous fungi. Filamentous fungi occupy a wide range of ecological niches with diverse life histories and physiological processes. Many live as saprotrophs decomposing and absorbing nutrients from dead materials while others have evolved the ability to be pathogens deriving their nutrients from living or dying hosts. Taking advantage of available genome sequences to explore the evolution of important gene families may help shed light on the processes that have allowed fungi to exploit diverse habitats.The P450-contain
AN APPROXIMATE ANALYTICAL PROCEDURE FOR TERNARY GIBBS-DUHEM EQUATION
三元Gibbs—Duhem方程的近似解析法

WANG Jixin,
王纪鑫

金属学报 , 1992,
Abstract: In the light of estimation model for ternary excess properties, an approximate analytical procedure for ternary Gibbs-Duhem equation was proposed, and verification by previous ternary systems as Cd-Bi-Pb and Zn-In-Cd was also made.
Page 1 /27942
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.